Page 2 of 169 results (0.007 seconds)

CVSS: 7.8EPSS: 3%CPEs: 9EXPL: 0

ovtopmd in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allows remote attackers to cause a denial of service (crash) via a crafted TCP request that triggers an out-of-bounds memory access. ovtopmd en HP OpenView Network Node Manager (OV NNM) versiones 6.41, 7.01 y 7.51, permite a los atacantes remotos causar una denegación de servicio (bloqueo) por medio de una petición TCP diseñada que desencadena un acceso de memoria fuera de límites. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=652 http://secunia.com/advisories/28798 http://www.securityfocus.com/archive/1/487586/100/0/threaded http://www.securityfocus.com/bid/27629 http://www.securitytracker.com/id?1019306 http://www.vupen.com/english/advisories/2008/0424 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 8%CPEs: 5EXPL: 0

Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434. Vulnerabilidad no especificada en HP-UX B.11.00 y B.11.11, cuando se ejecuta sendmail 8.9.3 o 8.11.1; y HP-UX B.11.23 cuando se ejecuta sendmail 8.11.1; permite a los atacantes remotos causar una denegación de servicio a través de vectores de ataque desconocidos. NOTA: debido a la falta de detalles de HP, no se sabe si este problema es un duplicado de otro CVE como CVE-2006-1173 o CVE-2006-4434. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00841370 http://secunia.com/advisories/24990 http://www.kb.cert.org/vuls/id/349305 http://www.securityfocus.com/bid/23606 http://www.securitytracker.com/id?1017966 http://www.vupen.com/english/advisories/2007/1504 • CWE-399: Resource Management Errors •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport functionality in HP-UX B.11.00 allows local users to cause a denial of service via unknown vectors. NOTE: due to lack of vendor details, it is not clear whether this is the same as CVE-2007-0916. Vulnerabilidad no especificada en la funcionalidad de transporte Address and Routing Parameter Area (ARPA) en HP-UX B.11.00 permite a usuarios locales provocar una denegación de servicio mediante vectores desconocidos. NOTA: Debido a la falta de detalles del fabricante, no está claro si es similar a CVE-2007-0916. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00944467 http://www.securityfocus.com/bid/23410 http://www.securitytracker.com/id?1017892 http://www.vupen.com/english/advisories/2007/1358 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5624 •

CVSS: 6.5EPSS: 0%CPEs: 13EXPL: 0

Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 6.20, 6.4x, 7.01, 7.50, and 7.51 allows remote authenticated users to access certain privileged "facilities" via unspecified vectors. Vulnerabilidad sin especificar en el HP OpenView Network Node Manager (OV NNM) 6.20, 6.4x, 7.01, 7.50 y 7.51 permite a usuarios remotos autenticados acceder a ciertos privilegios facilitados mediante vectores sin especificar. • http://secunia.com/advisories/24746 http://www.securityfocus.com/bid/23163 http://www.securitytracker.com/id?1017817 http://www.vupen.com/english/advisories/2007/1121 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00854999 https://exchange.xforce.ibmcloud.com/vulnerabilities/33241 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 3

Buffer overflow in the localtime_r function, and certain other functions, in libc in HP-UX B.11.11 and possibly other versions allows local users to execute arbitrary code via a long TZ environment variable. Desbordamiento de búfer en la función localtime_r y otras ciertas funciones, en libc en HP-UX B.11.11 y posiblemente otras versiones permiten usuarios locales ejecutar código de su elección a través de una variable de entorno TZ. • https://www.exploit-db.com/exploits/2636 http://blogs.23.nu/prdelka/stories/13144 http://www.securityfocus.com/bid/20718 https://exchange.xforce.ibmcloud.com/vulnerabilities/29777 •